Single Sign-On with Okta (SAML)

Learn how to configure Okta as a SAML-based identity provider.

Create a SAML Connection for a New App

  1. In Your application (like Kandji), navigate to the Settings page
  2. Click the Access tab
  3. Find the Authentication section and click the Add button on the bottom left of the authentication section (If that section does not appear, SSO is not enabled for your instance)
  4. In the Add SSO Connection pane, select the Custom SAML option
  5. Click Next

  1. Select Show Advanced Details
  2. Copy the Assertion Consumer Service URL and save it in a text document for later use
  3. Copy the Entity ID and save it too

Leave this browser tab open as you proceed with the instructions below

Now in Okta

  1. In a new browser tab, log in to your Okta tenant
  2. On the left-hand side, click the reveal triangle next to Applications
  3. Click Applications

Click Create App Integration

Select SAML 2.0 as the app integration type and click Next

  1. Enter an App name
  2. Upload an optional App logo
  3. Click Next
  1. In the Single sign on URL field, paste the Kandji Assertion Consumer Service URL that was copied earlier
  2. In the Audience URI (SP Entity ID) field, paste the Kandji Entity ID that was copied earlier
  3. Ensure that the Name ID format is set to Unspecified
  4. Ensure that the Application username is set to Okta username
  5. Ensure that the Update application username on is set to Create and update
  6. Select Next
  1. Select I’m an Okta customer adding an internal app
  2. Select This is an internal app that we have created
  3. Click Finish. 

Prodigy 13 Newsletter

Sign up for our monthly newsletter for business leaders on minimizing cybersecurity risk.

Related Articles

Security

SAML explained

SAML explained in plain English: https://www.onelogin.com/learn/saml SAML is an acronym used to describe the Security Assertion Markup Language (SAML). Its primary role in online security is

Read More
Security

Threat Hunting – Practical Guide

Resource: https://www.threathunting.net/files/hunt-evil-practical-guide-threat-hunting.pdf To begin, let’s clarify what threat hunting is: Threat hunting is the human-driven, proactive and iterative search through networks, endpoints, or datasets in

Read More

Threat Hunting Techniques, What is Hunting? Maturity model.

Resources: threat hunting: https://www.threathunting.net/ sqrrl archive: https://www.threathunting.net/sqrrl-archive practical hunting: https://www.threathunting.net/files/hunt-evil-practical-guide-threat-hunting.pdf huntpedia: https://www.threathunting.net/files/huntpedia.pdf framework cyber threat hunting: https://www.threathunting.net/files/framework-for-threat-hunting-whitepaper.pdf Threat Hunting is a creative process. One’s abilities

Read More